A Self-Learning Network Anomaly Detection System using Majority Voting

Size: px
Start display at page:

Download "A Self-Learning Network Anomaly Detection System using Majority Voting"

Transcription

1 A Self-Learnng Network Anomaly Detecton System usng Majorty Votng D.Hock and M.Kappes Department of Computer Scence and Engneerng, Unversty of Appled Scences, Frankfurt am Man, Germany e-mal: {dehock Abstract Network traffc s constantly changng. However, many current Intruson Detecton Systems requre somewhat statc condtons n order to work properly. In ths paper, we propose ongong tranng and updatng procedures and ntroduce a self-learnng Anomaly Detecton System based on majorty votng that can adapt to network changes by steadly exchangng small parts of tranng data. We evaluate the performance of dfferent replacement strateges for ths process. Of the evaluated replacement strateges, the replace oldest strategy archved the best results. Keywords Anomaly Detecton, Self-Learnng, Majorty Votng, Replacement Strateges 1. Introducton As shown n recent surveys, the number of threats has contnuously ncreased, along wth ther sophstcaton (Rchardson 2011). The preventon of network ntrusons and attacks s an ncreasngly mportant ssue as more and more crtcal processes and senstve data depend on network securty. One way to detect attacks early on are Intruson Detecton Systems (IDS). Krügel et al. (2005) specfed ntruson detecton as "the process of dentfyng and respondng to malcous actvtes targeted at computng and network resources". Whle tradtonal, sgnature-based IDS often lag behnd todays attacks, heurstc methods are a promsng alternatve. Heurstc technques are often clustered nto two categores, namely Msuse Detecton and Anomaly Detecton (Dokas et al. 2002). Msuse detecton recognzes threats by comparng them aganst a set of known ntrusons. Anomaly Detecton dscovers devatons from normal behavour. A major advantage of anomaly detecton s ts ablty to detect even unknown and new attacks. Msuse detecton can, lke tradtonal systems, only detect attacks whch are smlar to attacks already known (e.g., been prevously learned by the system). The common objectve of each Anomaly Detecton System s to report ntrusve actvty. However, not all anomalous actvtes are also ntrusve. A report of an anomalous, but not ntrusve actvty s called false postve. The dsadvantage of heurstc procedures, especally for anomaly detecton, are hgh false postve rates. False postves occur n partcular f new types of legtmate network traffc arse such as, e.g., the nstallaton of new dstrbuted programs, the use of new network devces or rregular backup and remote mantenance. 59

2 Proceedngs of the Tenth Internatonal Network Conference (INC2014) Actvty Descrpton Not ntrusve and not anomalous True Negatve (TN): there s no ntrusve actvty and the system does not report alerts. Intrusve and anomalous True Postve (TP): the actvty s ntrusve and s reported by the system. Intrusve but not anomalous False Negatve (FN): The system fals to detect an ntrusve actvty, because t s to smlar to the expected actvty. Not ntrusve but anomalous False Postve (FP): The actvty s not ntrusve, but dfferent from the usual actvty and reported by the system. Table 1: Defnton of possble outputs For some IDS, up to 99% of alerts can be classfed as false postves and are unrelated to network securty ssues (Petraszek 2004). Whle the false negatve rate can be mproved by combnng multple IDS, t s not possble to reduce a large number of false postves by such means. It s a tme-consumng task to dstngush between relevant and rrelevant alerts, whch means a hgh workload for securty analysts. A further problem of Anomaly Detecton s the so called concept drft (Gates and Taylor 2006), the phenomenon of unexpected change n network traffc over tme. Heurstc approaches usually have a learnng phase and a productve phase. Anomaly Detecton Systems learn the normal behavor of the network n the learnng phase, that means they derve a statstcal model, e.g., by collectng statstcs of network traffc over a perod of tme, whch can be compared later to the statstcs of the productve network traffc. Here, we refer to ths learned model as "sample". A hgh rate of false postves can have varous causes, but many can be traced back to samples of low qualty. The process of learnng the typcal network behavour can be a challengng task: If the s tranng carred out at a bad tme, the system mght not capture the complete regular behavour; f there s an attack n the sample, the system mght not be able to detect ths attack later; f the productve network s not accessble for the developer, he mght not be able to create accurate samples. However, even when the current behavour was captured perfectly, t s very lkely that the sample wll get outdated soon due to the contnuous change of network software, devces and usage. Gates et al. (2006) crtcally examned current Anomaly Detecton paradgms and dentfed these problems (summarzed as problem doman, operatonal usablty and tranng-data) as man ssues concernng todays Anomaly Detecton Systems. A possble soluton for some of these problems are IDS whch automatcally adjust wth the help of a dynamc update process to the changng network, so-called Self-Learnng Systems. Thus, the detecton model s updated so that t reflects the most recent network traffc. The contnuous manual updatng and testng by an operator would be a tme-consumng task and cannot be outsourced to a central nstance (lke for vrus scanners) as IDS updates need to be talored to the envronment they operate n and, n general, requre detaled customzaton. Thus, there s a need for methods to be able to optmze and update systems automatcally and locally. However, automatcally updatng such a system may open up new vulnerabltes f attacks are erroneously adjusted for, contamnatng the Anomaly Detecton System and preventng the detecton of such attacks (Kloft and Laskov 2007). In ths paper, we propose to solve these ssues by combnng a self-learnng approach wth majorty votng: Instead of checkng aganst a sngle model to 60

3 examne the network traffc, our approach compares the traffc to several models whch are contnuously replaced by mproved and better fttng models. At the same tme, the redundancy of our tranng data represents an advantage over nosy data and helps to stepwse replace obsolete data. The remander of the paper s organsed as follows. In the next secton, we present our method and ts features. We also outlne some detals of our update and replacement mechansms. Last but not least, we present the evaluatons of the ntroduced approach. The results nclude a comparson of performance usng dfferent replacement strateges. 2. Related Work Snce Dorothy Dennng publshed her ntal dea about Anomaly Detecton (Dennng 1987), exstng detecton mechansms have been contnuously expanded and mproved. Resultng methods nclude Outler Detecton (Dokas et al. 2002), Pattern Analyss (Km et al. 2004) and Prncpal Component Classfer (Munz and Carle 2007). However, only few of these approaches have been adopted n productve systems. Of partcular relevance to our work are methods that use multple testng and subsequent combnaton of the results and methods whch have ganed nterest especally n crowd-based mage classfcaton (Bachrach et al. 2012). Km and Bentley (2002) tested the effect of varous parameters (Sample lfe span, threshold) wth self-updatng clusterng algorthms. Cretu-Cocarle et al. (2009) used a Self-Learnng System together wth n-gram analyss and a smple votng algorthm. Our approach s smlar, but dffers n the detecton algorthm and features. Furthermore, we focused on the evaluaton of replacement strateges for automatc update mechansms. Therefore, we show more advanced strateges than full replacement. 3. Method In the followng, we wll brefly outlne the ratonale behnd our approach. Our method s based on classfyng network-traffc by assgnng a value from the range [0,1] ndcatng ts abnormalty to t. Dependng on the value and a threshold, the traffc s then classfed as normal or abnormal. Thus, f bengn and malgnant network traffc receve the same values durng tranng, the result s an area n whch we cannot dstngush whether the traffc s normal or ntrusve. In practce, not every value s equally often represented, for smplcty we assume for now that the values are normally dstrbuted for suffcently large data. Yet, the normal dstrbuton s presented merely as an llustraton, the actual dstrbuton depends of course on the feature, the user behavor and network characterstcs such as the Number of hosts and Operatng Systems (e.g., Mah (1997) found that the Packet Szes for HTTP traffc a heavy-taled dstrbuton). 61

4 Proceedngs of the Tenth Internatonal Network Conference (INC2014) Fgure 1: Relaton between overlappng values and ROC-curve The left part of Fgure 1 shows such grey areas wth the overlappng values wth the correspondng Recever Operatng Characterstc (ROC). The red bell-curve (left) shows values representng normal traffc, the blue bell-curve shows values representng ntrusve traffc. The p-value stands for the proporton of unambguous values (the proporton of non-overlappng areas), that means p s the probablty for a correct classfcaton. The rght sde of Fgure 1 shows the rato of the ROC curve (.e. true and false postve rate ) n relaton to the sze of the grey area (.e. grey area = 1-p) for all possble thresholds n [0,1]. For a mnmal threshold, all traffc s classfed as normal resultng n a pont (0,0) whereas for maxmal threshold all traffc s classfed as abnormal resultng n pont (1,1). The larger the area under the ROC curve (and thus the smaller the grey area), the better s the recognton rate. The ROC curve s a measure for the performance of a classfcaton algorthm (n ths case we classfy traffc as normal or anomalous) and shows the possble combnatons of true postve rate TP/(TP+ FN ) and false postve rate TN /(TN + FP). Dependng on the user preferences t s possble to adjust an Anomaly Detecton System a) more senstve and report even slght devatons from the normal behavour or b) more specfc to report only devatons that are defntely ntrusve. Whle a) leads to more false postves, b) leads to more undetected ntrusve actvtes. Fgure 2: Threshold 62

5 Fgure 2 shows the effect of the threshold. Every value on the left sde of the threshold s classfed as not ntrusve whle every value on the rght sde s classfed as ntrusve the ambguous values n the overlappng area ncluded. The ROC-Cuve shows the correspondng True and False Postve Rates for ths Threshold poston. A ROC curve close to the dagonal lne ndcates a random detecton rate. values close to the dagonal represent a same true and false postve rate, whch corresponds to the expected detecton rate of a random process. The deal ROC curve frst rses vertcally to true postve rate close to 1, whle false postve error rate ntally remans close to 0 before the false postve rate ncreases. We am to reduce the grey area by usng several samples smultaneously. Thus, nose s smoothed and the nfluence of outlers s reduced. The followng part of ths paper ntroduces a smple algorthm derved from Packet Header Anomaly Detecton (PHAD) (Mahoney and Chan 2001) and some features ntroduced n our earler papers whch focused on a correlaton analyss and outler detecton (Hock and Kappes 2013). Our method and features may be also a vald approach detect a wde range of anomales n practse, but our ratonale for ths approach s to evaluate the practcal use of majorty votng and Self-Learnng The Anomaly Detecton Method In our system, traffc s classfed takng nto account the followng features: 1. IP.src.Entropy and Dst.Port.Entropy show the probablty for the observed dstrbuton of IP Source Addresses and Destnaton Ports. For example, a Port scan wth nmap, that calls dfferent ports a sngle tme, generates very small entropy values. Number of Packets to port value = Number of Packets n Entropy= p( value ) log p ( value ) =1 2. Mean.Packet.Sze s the mean-value of all packet szes over a certan tme. It can dstngush certan IP Protocols and detect some attacks wth unusual small or large packet sze. Mean. Packet. Sze= 1 n n Packet. Sze =1 3. Utlzaton s the number of packets over tme. It can be another evdence for Denal of Servce, because many DoS depend on resource exhauston and therefore generate a lot of network traffc. Number of Packets Utlzaton= Tme Usng these features, PHAD determnes the probablty of an anomaly, called anomaly score, based on the number and last tme of prevous occurrences of values. The tradtonal PHAD algorthm looks at the values of Packet Header felds to assgn an anomaly score to each Packet. We look at the values of custom features 63

6 Proceedngs of the Tenth Internatonal Network Conference (INC2014) and assgn an anomaly score to each Tme Wndow nstead. PHAD calculates a probablty for the observaton of each value and then sums all values to an Anomaly Score. We further use a logarthm to adjust the score to a range between 0 and 1. After the anomaly score was calculated for each sample s appled majorty votng. Majorty votng can mprove the probablty of a correct result when there s an ntal probablty hgher than 50% (.e. random). The new probablty majorty votng assumes all examples are equally good. Let p denote the probablty for a correct decson for a sample and assume that p s equal for all samples. The decson accuracy of majorty votng method wth n completely ndependent samples s gven n = Number of tmes the value was seen n tranng r = Unque values n tranng t = Tme snce last occurence t n feature = r score = 0.1log 10 by the bnomal formula: P Total = ((n 1 )/2) = 0 feature n!!(n )! p n (1 p) P Total s the probablty for the correct classfcaton usng majorty votng Fgure 3 shows the total probablty for a correct decson n relaton to the qualty and the number of samples. 64 Fgure 3: Theoretcal mprovement of qualty through ncrease of samples In summary, our productve phase can be broken down nto three smple steps. At frst, we derve our features for the current network traffc. Then we calculate the anomaly score usng each of the learned samples. Each anomaly score hgher then a

7 threshold votes for anomalous and each score smaller then the threshold votes for normal. The majorty of these votes reveals whether the fnal decson for ths tme wndow s anomalous or normal n form of a value from range [0,1]. FnalDecs on = AnomalousVote AnomalousVote+ NormalVote As seen n Fgure 3, the theoretcal mprovement of the qualty, calculated wth the bnomal formula, dmnshes wth the number of samples used. For practcal purposes, we therefore, we use ths amount of samples and f there are more than 15 models, the one wth most false postves s deleted to keep resources and tme consumpton of our method acceptable Update Anomaly Detecton Systems need to adept to the envronment to deal wth the contnuously changng network traffc, the so-called concept drft. The manual defnton and evaluaton of adopted samples would be tme consumng tasks. There s the need for an automatc update mechansm. However, a full replacement of the learned sample mght lead to several problems such as an decrease of the detecton performance due to outler, nose or the unnotced learnng of attacks. Therefore, our approach evaluates dfferent replacement strateges to update the Anomaly Detecton System step by step. The Self-Learnng Process frst adds a new sample generated from the current traffc and then selects a deletes one of the sample to keep the orgnal number of samples. The selecton parameter s defned by the replacement strategy. Some common replacement strateges are: Strategy Descrpton Parameter Replace worst Deletes the sample that performed worst Performance over an evaluaton perod. Replace random Replaces a random sample, f the new Performance sample fulfls a mnmum performance. Replace most smlar Calculates a smlarty measure and replaces Smlarty one of the two most smlar. Replace oldest Replace the sample added frst. chronologcal order Table 2: Overvew of Replacement Strateges Dependng on the replacement strategy, we need to calculate the performance of one or several samples or the smlarty between two samples. We consult the correlaton as smlarty measure: corr n 2 x,y = x x y y / x x y y = 1 n = 1 n =

8 Proceedngs of the Tenth Internatonal Network Conference (INC2014) The performance of a sample s approxmated wth the proporton of values ncluded n the sample. Therefore, there s the need to perform an evaluaton phase and compare the values from the evaluaton phase wth the values ncluded n the sample: Number of values captured by sample Performance= Number of total values 4. Results In order to test the replacement strateges, we set up an experment n whch network traffc was montored over a total perod of 5 hours. The features, as lsted n secton 2.1, were calculated for traffc representng a 10 second tme wndow. Samples were created usng the features from 15 tme wndows. The normal network traffc has been created usng a Wndows PC n a test network wth an Internet connecton. In addton to the generated traffc from Wndows (e.g. ARP, DHCP,..) we executed typcal user actvtes such as web rado, vdeo streamng, browsng and e-mal. Every 100 seconds an IPv6 Router Advertsement Flood was carred out as proxy for denal of servce attacks. A new sample for replacement strateges was offered once Fgure 4: Anomaly Scores over Tme 15 new tme wndows wth Anomaly score < 0.5. were avalable. 66

9 Fgure 4 shows two exemplary chosen replacement strateges over the course of tme. The x-axs shows the course of tme n the form of the score numbers (the traffc s rated n tme slots of 10 seconds), the y-axs ndcates the probablty for a anomaly (gven by the majorty votng). The upper part of the Fgure, s the plot wthout the exchange of samples, and the lower part shows the same experment when the oldest sample s replaced. Whle the black crcles show the score for normal traffc (should always be assessed wth 0), the red trangles show attacks (should always be assessed wth 1). The recognton rate n the upper dagram abruptly decreases after about half the tme (the black cloud of ponts s suddenly more dense n the upper part of the plot). Ths behavour usually occurs when the network behavour changes and the samples get deprecated. The lower dagram wth the replace oldest strategy shows a perod of adjustment where the deprecated samples get replaced by more fttng samples. After ths adaptaton phase, the detecton rate s agan better. The detaled performance of all strateges s shown as a ROC Curve (see Fgure 5). As already descrbed n secton 2, the result of classfcaton methods (.e. anomaly detecton as well), s always a compromse of detecton rate and error rate. Ths compromse can be generally adjusted by a threshold value. A ROC curve shows all possble combnatons of recognton rate and error rate and thereby provdes a better vew as a sngle value. We use the area under curve (AUC) as a numercal qualty measure (see Table 2). An AUC of 1 represents perfect detecton whle an AUC of 0.5 represents completely random results. The experment wthout replacement acheved, as expected, the worst results. "replace oldest" archved the best results. The replace worst strategy mght perform better wth another measure for the sample performance. Fgure 5: Expermental Results for Dfferent Replacement Strateges Ths could be archved by an addtonal evaluaton of each new sample over a perod of tme or feedback by humans. The nfluence of addtonal parameters such as sample sze, replacement frequency or recognton method has not been tested here. However, t s evdent that the replacement strategy can have, ndependent from other parameter, sgnfcant mpact on the qualty of the anomaly detecton. 67

10 Proceedngs of the Tenth Internatonal Network Conference (INC2014) Replacement Strategy AUC No Replacement Oldest Worst Random Most Smlar Table 3: Area under Curve 5. Concluson and Future Work In ths paper, we evaluated Anomaly Detecton n combnaton wth majorty votng by usng several, dynamcally updated traffc samples. Our results strongly ndcate that multple samples reduce nose and outlers. Furthermore, majorty votng decreases false postves through adaptng the system by self-learnng. Our long-term goal s to develop and feld-test a modern Anomaly Detecton System based on the methods outlned n ths paper. We focused on the evaluaton of replacement strateges to for automatc update mechansms and showed that the replacement strategy has mpact on the qualty and can prevent concept drft. The replace oldest strategy archved the best results n our experments. Ths work was supported n part by the German Federal Mnstry of Educaton and Research n scope of grant number 03FH005PA2. Responsble for the content are the authors. 6. References Bachrach, Y., Graepel, T., Kasnec, G., Kosnsk, M. and Gael, J. (2012), "Crowd IQ - Aggregatng Opnons to Boost Performance", In Proc. of the 11th Internatonal Conference on Autonomous Agents and Multagent Systems, Vol. 1, pp Cretu-Cocarle, G.F., Stavrou, A., Locasto, M.E. and Stolfo, S.J. (2009), "Adaptve Anomaly Detecton va Self-Calbraton and Dynamc Updatng", In Proc. Recent Advances n Intruson Detecton, Sprnger, pp Dennng, D.E. (1987), "An ntruson-detecton model", IEEE Transactons on Software Engneerng, pp Dokas, P., Ertoz, L., Kumar, V., Lazarevc, A., Srvastava, J. and Tan, P. (2002), "Data mnng for network ntruson detecton", In Proc. NSF Workshop on Next Generaton Data Mnng, pp Gates, C. and Taylor, C. (2006), "Challengng the anomaly detecton paradgm: a provocatve dscusson", In Proc. of the 2006 workshop on New securty paradgms, ACM, pp Hock, D. and Kappes, M. (2013), "Usng R for anomaly detecton n network traffc", In Proc. ITA 13, Ffth Internatonal Conference on Internet Technologes and Applcatons. Km, J. and Bentley, P.J. (2002), "Towards an Artfcal Immune System for Network Intruson Detecton - An Investgaton of dynamc Clonal Selecton", In Proc. of the 2002 Evolutonary Computaton CEC'02, IEEE, Vol. 2, pp

11 Km, M., Kong, H., Hong, S., Chung, S. and Hong, J.W. (2004), "A flow-based method for abnormal network traffc detecton", In Proc. NOMS 2004, A Network Operatons and Management Symposum, IEEE/I-FIP, Vol. 1, pp Kloft, M. and Laskov, P. (2007), "A posonng attack aganst onlne anomaly detecton", In Proc. NIPS Workshop on Machne Learnng n Adversaral Envronments for Computer Securty. Kruegel, C., Valeur, F. and Vgna, G. (2005), "Intruson detecton and correlaton: challenges and solutons", Sprnger, Vol. 14. Mah, B.A. (1997), "An emprcal model of HTTP network traffc", In Proc. INFOCOM'97, IEEE, Vol. 2, pp Mahoney, M. and Chan, P.K. (2001), "PHAD: Packet header anomaly detecton for dentfyng hostle network traffc", Florda Insttute of Technology techncal report, pp1-17. Munz, G. and Carle, G. (2007), "Real-tme analyss of flow data for network attack detecton", In Proc. IM'07, 10th IFIP/IEEE Internatonal Symposum on Integrated Network Management, IEEE, pp Petraszek, T. (2004), "Usng adaptve alert classfcaton to reduce false postves n ntruson detecton", In Proc. Recent Advances n Intruson Detecton, Sprnger, pp Rchardson, R. (2011), "CSI computer crme and securty survey" 69

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

The Research of Support Vector Machine in Agricultural Data Classification

The Research of Support Vector Machine in Agricultural Data Classification The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Neural Networks in Statistical Anomaly Intrusion Detection

Neural Networks in Statistical Anomaly Intrusion Detection Neural Networks n Statstcal Anomaly Intruson Detecton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech., Unversty Heghts, Newark, NJ 72, USA

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Fuzzy Modeling of the Complexity vs. Accuracy Trade-off in a Sequential Two-Stage Multi-Classifier System

Fuzzy Modeling of the Complexity vs. Accuracy Trade-off in a Sequential Two-Stage Multi-Classifier System Fuzzy Modelng of the Complexty vs. Accuracy Trade-off n a Sequental Two-Stage Mult-Classfer System MARK LAST 1 Department of Informaton Systems Engneerng Ben-Guron Unversty of the Negev Beer-Sheva 84105

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Automated Selection of Training Data and Base Models for Data Stream Mining Using Naïve Bayes Ensemble Classification

Automated Selection of Training Data and Base Models for Data Stream Mining Using Naïve Bayes Ensemble Classification Proceedngs of the World Congress on Engneerng 2017 Vol II, July 5-7, 2017, London, U.K. Automated Selecton of Tranng Data and Base Models for Data Stream Mnng Usng Naïve Bayes Ensemble Classfcaton Patrca

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Data Mining: Model Evaluation

Data Mining: Model Evaluation Data Mnng: Model Evaluaton Aprl 16, 2013 1 Issues: Evaluatng Classfcaton Methods Accurac classfer accurac: predctng class label predctor accurac: guessng value of predcted attrbutes Speed tme to construct

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Learning-based License Plate Detection on Edge Features

Learning-based License Plate Detection on Edge Features Learnng-based Lcense Plate Detecton on Edge Features Wng Teng Ho, Woo Hen Yap, Yong Haur Tay Computer Vson and Intellgent Systems (CVIS) Group Unverst Tunku Abdul Rahman, Malaysa wngteng_h@yahoo.com, woohen@yahoo.com,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Network Intrusion Detection Based on PSO-SVM

Network Intrusion Detection Based on PSO-SVM TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Abstract. 1. Introduction

Abstract. 1. Introduction One-Class Tranng for Masquerade Detecton Ke Wang Salvatore J. Stolfo Computer Scence Department, Columba Unversty 500 West 20 th Street, New York, NY, 0027 {kewang, sal}@cs.columba.edu Abstract We extend

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

A Lazy Ensemble Learning Method to Classification

A Lazy Ensemble Learning Method to Classification IJCSI Internatonal Journal of Computer Scence Issues, Vol. 7, Issue 5, September 2010 ISSN (Onlne): 1694-0814 344 A Lazy Ensemble Learnng Method to Classfcaton Haleh Homayoun 1, Sattar Hashem 2 and Al

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

An Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment

An Evolvable Clustering Based Algorithm to Learn Distance Function for Supervised Environment IJCSI Internatonal Journal of Computer Scence Issues, Vol. 7, Issue 5, September 2010 ISSN (Onlne): 1694-0814 www.ijcsi.org 374 An Evolvable Clusterng Based Algorthm to Learn Dstance Functon for Supervsed

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB

SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB SURFACE PROFILE EVALUATION BY FRACTAL DIMENSION AND STATISTIC TOOLS USING MATLAB V. Hotař, A. Hotař Techncal Unversty of Lberec, Department of Glass Producng Machnes and Robotcs, Department of Materal

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Journal of Process Control

Journal of Process Control Journal of Process Control (0) 738 750 Contents lsts avalable at ScVerse ScenceDrect Journal of Process Control j ourna l ho me pag e: wwwelsevercom/locate/jprocont Decentralzed fault detecton and dagnoss

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Machine Learning. Topic 6: Clustering

Machine Learning. Topic 6: Clustering Machne Learnng Topc 6: lusterng lusterng Groupng data nto (hopefully useful) sets. Thngs on the left Thngs on the rght Applcatons of lusterng Hypothess Generaton lusters mght suggest natural groups. Hypothess

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

An Improved Neural Network Algorithm for Classifying the Transmission Line Faults

An Improved Neural Network Algorithm for Classifying the Transmission Line Faults 1 An Improved Neural Network Algorthm for Classfyng the Transmsson Lne Faults S. Vaslc, Student Member, IEEE, M. Kezunovc, Fellow, IEEE Abstract--Ths study ntroduces a new concept of artfcal ntellgence

More information

Study of Data Stream Clustering Based on Bio-inspired Model

Study of Data Stream Clustering Based on Bio-inspired Model , pp.412-418 http://dx.do.org/10.14257/astl.2014.53.86 Study of Data Stream lusterng Based on Bo-nspred Model Yngme L, Mn L, Jngbo Shao, Gaoyang Wang ollege of omputer Scence and Informaton Engneerng,

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Fast Feature Value Searching for Face Detection

Fast Feature Value Searching for Face Detection Vol., No. 2 Computer and Informaton Scence Fast Feature Value Searchng for Face Detecton Yunyang Yan Department of Computer Engneerng Huayn Insttute of Technology Hua an 22300, Chna E-mal: areyyyke@63.com

More information

Feature Selection as an Improving Step for Decision Tree Construction

Feature Selection as an Improving Step for Decision Tree Construction 2009 Internatonal Conference on Machne Learnng and Computng IPCSIT vol.3 (2011) (2011) IACSIT Press, Sngapore Feature Selecton as an Improvng Step for Decson Tree Constructon Mahd Esmael 1, Fazekas Gabor

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Collaboratively Regularized Nearest Points for Set Based Recognition

Collaboratively Regularized Nearest Points for Set Based Recognition Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,

More information

Intelligent Information Acquisition for Improved Clustering

Intelligent Information Acquisition for Improved Clustering Intellgent Informaton Acquston for Improved Clusterng Duy Vu Unversty of Texas at Austn duyvu@cs.utexas.edu Mkhal Blenko Mcrosoft Research mblenko@mcrosoft.com Prem Melvlle IBM T.J. Watson Research Center

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

THE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT

THE PATH PLANNING ALGORITHM AND SIMULATION FOR MOBILE ROBOT Journal of Theoretcal and Appled Informaton Technology 30 th Aprl 013. Vol. 50 No.3 005-013 JATIT & LLS. All rghts reserved. ISSN: 199-8645 www.jatt.org E-ISSN: 1817-3195 THE PATH PLANNING ALGORITHM AND

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A MODIFIED K-NEAREST NEIGHBOR CLASSIFIER TO DEAL WITH UNBALANCED CLASSES

A MODIFIED K-NEAREST NEIGHBOR CLASSIFIER TO DEAL WITH UNBALANCED CLASSES A MODIFIED K-NEAREST NEIGHBOR CLASSIFIER TO DEAL WITH UNBALANCED CLASSES Aram AlSuer, Ahmed Al-An and Amr Atya 2 Faculty of Engneerng and Informaton Technology, Unversty of Technology, Sydney, Australa

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Online Detection and Classification of Moving Objects Using Progressively Improving Detectors

Online Detection and Classification of Moving Objects Using Progressively Improving Detectors Onlne Detecton and Classfcaton of Movng Objects Usng Progressvely Improvng Detectors Omar Javed Saad Al Mubarak Shah Computer Vson Lab School of Computer Scence Unversty of Central Florda Orlando, FL 32816

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET

BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET 1 BOOSTING CLASSIFICATION ACCURACY WITH SAMPLES CHOSEN FROM A VALIDATION SET TZU-CHENG CHUANG School of Electrcal and Computer Engneerng, Purdue Unversty, West Lafayette, Indana 47907 SAUL B. GELFAND School

More information

BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION

BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION BAYESIAN MULTI-SOURCE DOMAIN ADAPTATION SHI-LIANG SUN, HONG-LEI SHI Department of Computer Scence and Technology, East Chna Normal Unversty 500 Dongchuan Road, Shangha 200241, P. R. Chna E-MAIL: slsun@cs.ecnu.edu.cn,

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Complex System Reliability Evaluation using Support Vector Machine for Incomplete Data-set

Complex System Reliability Evaluation using Support Vector Machine for Incomplete Data-set Internatonal Journal of Performablty Engneerng, Vol. 7, No. 1, January 2010, pp.32-42. RAMS Consultants Prnted n Inda Complex System Relablty Evaluaton usng Support Vector Machne for Incomplete Data-set

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE

SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE SHAPE RECOGNITION METHOD BASED ON THE k-nearest NEIGHBOR RULE Dorna Purcaru Faculty of Automaton, Computers and Electroncs Unersty of Craoa 13 Al. I. Cuza Street, Craoa RO-1100 ROMANIA E-mal: dpurcaru@electroncs.uc.ro

More information

Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques

Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques Enhancement of Infrequent Purchased Product Recommendaton Usng Data Mnng Technques Noraswalza Abdullah, Yue Xu, Shlomo Geva, and Mark Loo Dscplne of Computer Scence Faculty of Scence and Technology Queensland

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Dynamic Camera Assignment and Handoff

Dynamic Camera Assignment and Handoff 12 Dynamc Camera Assgnment and Handoff Br Bhanu and Ymng L 12.1 Introducton...338 12.2 Techncal Approach...339 12.2.1 Motvaton and Problem Formulaton...339 12.2.2 Game Theoretc Framework...339 12.2.2.1

More information

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1

Outline. Discriminative classifiers for image recognition. Where in the World? A nearest neighbor recognition example 4/14/2011. CS 376 Lecture 22 1 4/14/011 Outlne Dscrmnatve classfers for mage recognton Wednesday, Aprl 13 Krsten Grauman UT-Austn Last tme: wndow-based generc obect detecton basc ppelne face detecton wth boostng as case study Today:

More information

Using Neural Networks and Support Vector Machines in Data Mining

Using Neural Networks and Support Vector Machines in Data Mining Usng eural etworks and Support Vector Machnes n Data Mnng RICHARD A. WASIOWSKI Computer Scence Department Calforna State Unversty Domnguez Hlls Carson, CA 90747 USA Abstract: - Multvarate data analyss

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS

GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS GENETIC ALGORITHMS APPLIED FOR PATTERN GENERATION FOR DOWNHOLE DYNAMOMETER CARDS L. Schntman 1 ; B.C.Brandao 1 ; H.Lepkson 1 ; J.A.M. Felppe de Souza 2 ; J.F.S.Correa 3 1 Unversdade Federal da Baha- Brazl

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

A User Selection Method in Advertising System

A User Selection Method in Advertising System Int. J. Communcatons, etwork and System Scences, 2010, 3, 54-58 do:10.4236/jcns.2010.31007 Publshed Onlne January 2010 (http://www.scrp.org/journal/jcns/). A User Selecton Method n Advertsng System Shy

More information

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION

CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 48 CHAPTER 3 SEQUENTIAL MINIMAL OPTIMIZATION TRAINED SUPPORT VECTOR CLASSIFIER FOR CANCER PREDICTION 3.1 INTRODUCTION The raw mcroarray data s bascally an mage wth dfferent colors ndcatng hybrdzaton (Xue

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

An IPv6-Oriented IDS Framework and Solutions of Two Problems

An IPv6-Oriented IDS Framework and Solutions of Two Problems An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information